References
1. Thomas A. Longstaff and E. Eugene Schultz ,
"Beyond Preliminary Analysis of the WANK and OILZ Worms: A Case Study of Malicious Code," Computers & Security, Volume 12, Issue 1, February 1993,
pp. 61-77.4.
2. Mikko Hypponen ,
"Virus Activation Routines," EICAR, 1995,
pp. T3 1-11.
3. Peter Szor ,
"Poetry in Motion" Virus Bulletin, April 2000,
pp. 6-8.
4. Fridrik Skulason ,
"Disk Killer," Virus Bulletin, January 1990,
pp. 1213.
5. Mark Ludwig ,
"Giant Black Book of Computer Viruses," American Eagle Publications, Inc., 1995.
6. Vesselin Bontchev ,
"Are 'Good' Computer Viruses Still a Bad Idea?," EICAR, 1994,
pp. 25-47.
7. Dr. Adam L. Young and Dr. Moti Yung ,
"Malicious Cryptography: Exposing Cryptovirology," Wiley Publishing, Indianapolis, 2004, ISBN: 0764549758 (Paperback).
8. Gerald D. Hill III,
"The Trend Toward Non-Real-Time Attacks," Computer Fraud & Security, November 2003,
pp. 5-11.
9. Bruce Schneier ,
"Blaster and the August 14th Blackout," http://www.schneier.com/crypto-gram-0312l.
10. Anti-Phishing Working Group, http://www.antiphishing.org/.
11. Stuart Taylor ,
"Misguided or Malevolent? New Trends In Virus Writing," Virus Bulletin, February 2004,
pp. 11-12.
12. Peter Szor and Ferenc Leitold ,
"Attacks Against Servers," Forraskod, March/April 1995,
pp. 2-3.
|